I've been provided credit monitoring and identity theft protection services from the company CSID. Their CyberAgent internet surveillance tool claims to "monitor thousands of websites and millions of ...

Email addresses can be hacked or perhaps even spoofed. I need to pay individuals via paypal and I fear that over time people's email will change or become compromised. How can I ensure I am paying the ...

Much of my personal information is available online. That is not a particular issue for me, but someone used my name to make a gmail account with my specific name on it (it is an unusual name), and ...

Various financial institutions, government agencies, etc., use public records information to confirm people's identities, as touched upon in UPS my choice -- How can I access my public records? The ...

I recently gave a guy I met over the internet my bank account information and my social security number, even though I know it is stupid. Then he wired money from my account to western union.
Can I ...

I routinely shred documents with any personal information on them to protect myself and others against identity theft. I have no doubts that shredding any documents with ID numbers, account details ...

My apologies if this question has been asked before.
How does a medical practice assure patients that the practice follows excellent computer security practices?
Conversely, how does a patient find ...

If 453.7 million social security numbers have been issued to date.
And there are only 1 billion = 1000 million distinct 9 digit integer pairs.
Then that means if I were to make up any 9 digits, that ...

I want to make sure my information is safe. This website is openly china-oriented but says to secure card information with Secure Sockets Layer technology (SSL) on those pages that involve sensitive ...

There are some usernames that shouldn't be allowed to register on online services, for example:
administrator,
admin,
root,
system,
owner,
hostmaster,
webmaster,
sitename or
sitenameadmin
As far as ...

I am from Australia and I use a iPhone 4.
Today, a young guy asked to borrow my phone, since he was out of credit and since I was trying to be a good samaritan, let him borrow my phone (also we were ...

My laptop (modded 2007 Macbook Pro) was stolen 2 days ago when I didn't pay attention to my backpack in a tourist spot in Europe and while I'm quite certain they won't have much use for it (the apple ...

I fell in a scamming trap. It took me a while to figure it out. Blinded like an idiot. But it is what it is. I can only do as much as I can now. Tell me if there is anything else I should do.
After ...

I had a conversation today and someone challenged me as to why you would need to verify the identity of a user calling a service desk with anything other than their company email. Granted I know these ...

Several times I get a phone call from a company- my bank, utility companies etc. Many times they are just cold calling me, but once or twice they were calling for legitimate reasons (ie, something to ...

I am curious about how I can limit the consequences of an identity theft. I see a lot of discussion and advice about managing passwords securely or blocking malware. But what if it happens?
What if ...